Report suspicious activity to help prevent identity theft.
“My Facebook was HACKED” is a phrase I’m hearing more often lately. Facebook is one of the most popular social media platforms in the world, with over 2.8 billion active users. Unfortunately, with such a large user base, there are bound to be some bad actors who create fake accounts to scam, hack, spoof or deceive others....
Help! I think I deleted my important file.
First things first. If this file is really important, power down your computer and let a professional take care of it. Following this guide may prevent recovery by a professional.
1- Look in the folder you saved it in
This is an obvious step but just check where you saved the file and open it. See if the file is there.
2- Look in Recently Opened files
Most programs have a way to see your recently...
Train Your Employees in Tech
Sometimes we all take it for granted that others have basic knowledge of tech, but it is always important to reiterate this for employees in the workplace that may be unclear on their responsibilities regarding company information. The weakest point of any security system is the human factor.
Employee Training and Documentation
Make sure people in your company are trained on what is in their role...
Duplicates Waste Space
So you suspect you have duplicate files? Here is what we do to find the files. Some of these tools are a bit technical, but if you have mid-level skills with computers you’d likely be able to use them.
A big warning, if you are about to use any of this to clean up your duplicates, BACK UP YOUR DATA FIRST.
File Visualizer
These tools can be used to visualize the files on your computer. It...
How Much Security Do I need?
Computer security is a hot topic recently. People ask us frequently what level of protection they need going forward. Here is our rundown on the most important parts of security and who should be using them. See below for full descriptions.
Home
1-50 Employees
50+ Employees
Training
Y
Y
Y
Antivirus
Y
Y
Y
Passwords
Y
Y
Y
2-Factor Authentication
Y
Y
Y
Backups
M
Y
Y
Security...
Cyber Security Pitfalls
The world is changing and for better or worse, our world is becoming increasingly digital. It means that our personal data, finances, and company data are being increasingly available to both ourselves, and hackers. Our world is on an upward trend of digitizing itself, and we either keep ahead of the curve, or find ourselves under it. We constantly see other companies and people in a professional...
The Clouds Are Closing In
We started out with only a few cloud services from the major companies, but the industry has fragmented. Most of us have a bunch of passwords now, and are part of more cloud services than we can count. As times move forward, this issue will progress. Your passwords saved on your iCloud account can’t be used on a PC easily. Your Skype account can’t reach Facetime users. This fragmentation...
2FA is 2 Factor Authentication
Our passwords aren’t exactly secure. You can still be affected by data breaches, viruses, or fake login pages that steal your passwords, even if you have the best possible password. On top of that, a lot of people reuse passwords in multiple places, so if one login gets breached, the others do too. A data breach will likely happen to everyone at some time.
In Comes 2-Factor Authentication
So...
Smells Like Phish
Top 4 Red Flags to Avoid Scammers
Stranger Danger – Unknown Email Senders
The easiest way to spot a scam is to check what address it is coming from. If you got an email from a company like ACME Inc, you should be able to see that sender’s email address from @acme.com or something of the sort. If the sender’s email originates from @gmail.com or another free email service, chances...
Opinion: The Future of Tech
Yeah so this one is just a fun little article we decided to write. Who really knows what is going to happen in the future, but it’s fun to guess, right? Here are some of our loose predictions for the future of the tech industry:
Cloud Desktops
This has been around for a long time, but it is basically a virtual desktop (like Windows) that you can access from any device (like your iPad or Laptop)....
- 1
- 2